Tag: obfuscation

  • The Register: Malware in Lisp? Now you’re just being cruel

    Source URL: https://www.theregister.com/2025/03/29/malware_obscure_languages/ Source: The Register Title: Malware in Lisp? Now you’re just being cruel Feedly Summary: Miscreants warming to Delphi, Haskell, and the like to evade detection Malware authors looking to evade analysis are turning to less popular programming languages like Delphi or Haskell.… AI Summary and Description: Yes Summary: The text discusses a…

  • Slashdot: How AI Coding Assistants Could Be Compromised Via Rules File

    Source URL: https://developers.slashdot.org/story/25/03/23/2138230/how-ai-coding-assistants-could-be-compromised-via-rules-file?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How AI Coding Assistants Could Be Compromised Via Rules File Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant security vulnerability in AI coding assistants like GitHub Copilot and Cursor, highlighting how malicious rule configuration files can be used to inject backdoors and vulnerabilities in…

  • Hacker News: Reversing Samsung’s H-Arx Hypervisor Framework (Part 1)

    Source URL: https://dayzerosec.com/blog/2025/03/08/reversing-samsungs-h-arx-hypervisor-part-1.html Source: Hacker News Title: Reversing Samsung’s H-Arx Hypervisor Framework (Part 1) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses Samsung’s advancements in mobile hypervisor security, specifically their Real-time Kernel Protection (RKP) implemented through their Exynos platform. It details the transition from a monolithic to a modular design, highlighting…

  • Microsoft Security Blog: New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/11/new-xcsset-malware-adds-new-obfuscation-persistence-techniques-to-infect-xcode-projects/ Source: Microsoft Security Blog Title: New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects Feedly Summary: Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a sophisticated modular macOS malware that infects Xcode projects, in the wild. Its first known variant since 2022, this latest XCSSET malware features…

  • Threat Research Archives – Unit 42: Uncovering .NET Malware Obfuscated by Encryption and Virtualization

    Source URL: https://unit42.paloaltonetworks.com/malware-obfuscation-techniques/ Source: Threat Research Archives – Unit 42 Title: Uncovering .NET Malware Obfuscated by Encryption and Virtualization Feedly Summary: AI Summary and Description: Yes **Summary:** This article provides a detailed examination of sophisticated obfuscation techniques utilized by various malware families, specifically focusing on how these methods enhance the ability of malware to evade…

  • Hacker News: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries Source: Hacker News Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Comments AI Summary and Description: Yes Summary: This text details the challenges associated with analyzing malware written in Go that utilizes the garble obfuscator, focusing on the introduction of the GoStringUngarbler tool, which automates the deobfuscation process of string literals.…

  • Cloud Blog: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/ Source: Cloud Blog Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Written by: Chuong Dong Overview In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble…

  • Unit 42: Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems

    Source URL: https://unit42.paloaltonetworks.com/?p=138517 Source: Unit 42 Title: Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems Feedly Summary: A topological analysis and case studies add nuance to a study of malicious traffic distribution systems. We compare their use by attackers to benign systems. The post Beneath the Surface: Detecting and Blocking Hidden Malicious…

  • Unit 42: Uncovering .NET Malware Obfuscated by Encryption and Virtualization

    Source URL: https://unit42.paloaltonetworks.com/?p=138493 Source: Unit 42 Title: Uncovering .NET Malware Obfuscated by Encryption and Virtualization Feedly Summary: Malware authors use AES encryption and code virtualization to evade sandbox static analysis. We explore how this facilitates spread of Agent Tesla, XWorm and more. The post Uncovering .NET Malware Obfuscated by Encryption and Virtualization appeared first on…